[CLSA-2024:1731348593] kernel: Fix of 18 CVEs
Type:
security
Severity:
Important
Release date:
2024-11-11 18:09:59 UTC
Description:
- mm: call the security_mmap_file() LSM hook in remap_file_pages() {CVE-2024-47745} - slip: make slhc_remember() more robust against malicious packets {CVE-2024-50033} - drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer {CVE-2024-49991} - firmware_loader: Block path traversal {CVE-2024-47742} - ext4: avoid OOB when system.data xattr changes underneath the filesystem {CVE-2024-47701} - tty: n_gsm: Fix use-after-free in gsm_cleanup_mux {CVE-2024-50073} - Bluetooth: L2CAP: Fix uaf in l2cap_connect {CVE-2024-49950} - ext4: avoid use-after-free in ext4_ext_show_leaf() {CVE-2024-49889} - driver core: bus: Fix double free in driver API bus_register() {CVE-2024-50055} - ext4: fix timer use-after-free on failed mount {CVE-2024-49960} - smack: tcp: ipv4, fix incorrect labeling {CVE-2024-47659} - ppp: fix ppp_async_encode() illegal access {CVE-2024-50035} - ALSA: asihpi: Fix potential OOB array access {CVE-2024-50007} - ext4: no need to continue when the number of entries is 1 {CVE-2024-49967} - drm/amd/display: Fix index out of bounds in degamma hardware format translation {CVE-2024-49894} - ext4: fix double brelse() the buffer of the extents path {CVE-2024-49882} - ACPI: sysfs: validate return type of _STR method {CVE-2024-49860} - bna: adjust 'name' buf size of bna_tcb and bna_ccb structures {CVE-2024-43839}
Updated packages:
  • bpftool-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm
    sha:a943e60ddd6c00b395f9ab38bfb1bca63dfb1073ea7346f8ff699a3978e066be
  • kernel-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm
    sha:5b128ee8dfdc4113cb5cda50dbc86e571b966cd65675e2ba141ece0297deeb91
  • kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm
    sha:c695b67990e067c955ade5cbfbc3ea8f2c335dcf8e008d263a81c7e41a09bfc5
  • kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm
    sha:246711799dc8faad648fe9b7a39865bab5dc21464be9eaf25c067423070afc6a
  • kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm
    sha:74c3e1de9779329e4c0e400021cea0cad4ff882cfd9933291c5716769afd55b7
  • kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm
    sha:ad0c4aae0b9429b2bd236579668222c60f163e07857091133a1e1ec958d0bf96
  • kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm
    sha:f3e4b311df7984242b40aafd823c512ea6d82a267f990c0e81907fe2ccd9b15c
  • kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm
    sha:212acf284903015740cb34d923a6818b17b3bb7378ae8a0649331569a97e9246
  • kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm
    sha:42b03cc2e8bfccf3ee3a0b3a67419c1fd3477081674af473be51706d5d4fdeb5
  • perf-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm
    sha:d470c706442cbcb3861b9815988faa12b405e732fdfb6482834d248326c0a632
  • python-perf-3.10.0-1160.119.1.el7.tuxcare.els12.x86_64.rpm
    sha:9640ef3e1fa9c8b7e6d99fdb606a981d7568cca2cac68a096207c1ca9ff9d92c
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.